The strongest mobile encryption available

We guarantee your privacy

Diamond Secure is a provider of encrypted communications solutions that guarantee the security and anonymity of user messages. We implement cutting-edge cryptography with attention to detail, leaving no attack vector unaddressed.

Server-side security

We rely on proprietary servers to facilitate communications. We keep no copies of user messages or encryption keys.

Untraceable devices

Diamond Secure has all location tracking features rooted out of the device OS. It cannot be localized with silent SMS as well.

No wiretapping

The phone has an IMSI-Catcher Detector that alerts users of suspicious cellular activity and nearby stingray devices.

Simple, Reliable, and Vulnerability-Free

Peer-to-peer messaging

Messages sent through our encrypted chat app go directly to the recipient’s device, without ever touching our servers. LEARN MORE

User-managed keys

Our PGP email client uses encryption keys that are generated and stored only on the user’s end. We have no copies of them. LEARN MORE

Instant connectivity

Vulnerability-free OS

The device runs on a highly customized version of Android, modified down to the kernel level to remove vulnerabilities.

Wipe from lock screen

Users don’t need to unlock their phone to perform a complete wipe of all data on it. It can be done from the lock screen with a special PIN.

Chip-off protection

We don’t store cryptographic keys in our phones’ memory and we use full-disk encryption. This prevents data extraction through chip-off. LEARN MORE

Why we solve your problems better than others?

Our service is built to protect users’ privacy - even from us. There are no encryption backdoors in our products; we don’t store cryptographic keys, nor user messages; our servers only facilitate the communication between users.

Competitors

When you use our chat, your messages go directly to your recipient. Our servers only alert user devices they are available to talk to each other. The messages never touch the servers.

Scenario 1

Sender is online, recipient is offline

The sender’s device contacts the server asking if the recipient is online. The server checks and sees they aren’t. The message doesn’t get sent and remains on the sender’s device.

Compare to Others

Scenario 1

Sender is online, recipient is offline

The sender’s device contacts the server asking if the recipient’s is online. The server finds that it isn’t. The message doesn’t get sent but waits on the server.

Compare to DIAMOND SECURE

Scenario 2

Sender is offline recipient comes online

If the sender goes offline before the recipient comes online, the message doesn’t get sent and remains on the sender’s device.

Compare to Others

Scenario 2

Sender is offline recipient comes online

If the sender goes offline before the recipient appears online, the message doesn’t get transmitted and remains on the server. Once the recipient’s device comes online, the server sends the message to it even though the sender is no longer online.

Compare to DIAMOND SECURE

Scenario 3

Sender and recipient are both online

The server just alerts the two parties that they are online. They can then talk and exchange files, knowing that their communication is secure.

Compare to Others

Scenario 3

Sender and recipient are both online

The server alerts the two parties that they are online. Once they start communicating, their messages get sent through the server.

The security of a PGP client depends on the cryptographic keys: how big they are, who manages them and where they are stored. We use 4096-bit keys, which are unbreakable. And, unlike competitors, we don’t generate the keys on our servers, and we don’t have copies of them.

You generate and store your keys

Our PGP email client allows you to generate cryptographic key pairs on your device. You can extract and store backups at a location you find secure. We have no copies and can’t help if you lose them.

Compare to Others

Your receive keys from the server

Our competitors generate PGP keys on their servers and send them to users. But if the servers are compromised, someone might access the keys and use them to read the messages encrypted with them.

Compare to DIAMOND SECURE

It takes longer than the age of universe to break a 4096-bit key using contemporary computing power

To establish a P2P VoIP (voice over IP) connection, the recipient and the initiator exchange compatibility information that shapes the specifications of the ZRTP connection. Then both peers generate ephemeral key pairs which are different for each session and transmit key agreement information. Finally, the peers use their voices to speak a secret that verifies that the channel is secure.

In VoIP all devices are both “client” and “server” at the same time. Once the connection is established, the users can leverage the full power of encrypted peer-to-peer (P2P) communication, where no information goes through any server, guaranteeing absolute privacy.

This approach allows the detection of man-in-the-middle (MiTM) attacks by showing a short authentication string (SAS) for users to compare over the phone verbally. Furthermore, after creating a shared secreted in a session, ZRTP mixes parts of it with the shared secret of the next call. This makes all subsequent sessions additionally protected and even more secure. Also, the generation of a new key pair for every connection guarantees that even if a key gets leaked, past communication is absolutely unbreachable because it’s protected by a different one.

This sophisticated approach creates multi-layered protection. If two endpoints use ZRTP to agree on a key, they can be sure that their communications are secured against any attack.

Momentum

WARNING! the concern with voice calls is that you are as secure as
your environment. Encryption protects communications only from being
intercepted. But if the room you are in is bugged, someone can listen
in on your conversation even before the encryption takes place.

Such techniques rely on physically removing the eMMC storage chip from your phone and mounting it on a device that can directly extract data from it. One way to counter that is to perform remote-wipe if your handset is stolen or taken away. Another way is to have the data on the chip properly secured.

Encrypted device and app storage

Diamond Secure handsets feature mandatory full-disc encryption, and all our apps use encrypted databases. To get to your messages, forensics specialists should first brute-force your encryption password, and then the app-lock passphrases.

Compare to Others

Accessible app storage

Most alternative services offer just apps for encrypted communications. If you tap on an app icon and it loads without asking for a password, this guarantees the app is not encrypted – and its storage is accessible to spyware and forensics specialists.

Compare to DIAMOND SECURE

Let’s partner for success

Diamond Secure offers reseller partners a chance to position themselves at the forefront of the fast-expanding market for mobile communication security. Our partner program is designed to enable your business growth and success.

Offer a superior product

Diamond Secure’s product is unrivaled on the market in terms of innovation, reliability, and the completeness of the security solution it offers.

Rely on 24/7 expert support

Our team of trained experts provides our partners with round-the-clock after-sale support via a ticketing system or over email, phone, and VoIP.

Receive marketing help

We empower our partners to make a better sales pitch and close deals by providing product knowledge and marketing support.

Achieve good profit margins

We make sure our partners achieve good profit margins by supplying them with stock at low prices and offering discounts.